Safe and controllable internet real-name certification mechanism

A real-name authentication, Internet technology, applied in the field of network security, can solve problems such as identity information confidentiality, and achieve the effect of reducing the burden

Inactive Publication Date: 2015-06-03
CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY +1
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The method of the present invention designs a safe and controllable Internet real-name authentication mechanism with foreground anonymity and background traceability, so that it can overcome the deficiencies of...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and controllable internet real-name certification mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with accompanying drawing and specific embodiment:

[0025] The present invention mainly includes the processing of three components: a registration stage, a network behavior monitoring stage and a non-repudiation tracing stage. When the UE wants to accept the service provided by the Web Server, the Web Server requires real-name authentication, the UE transmits the identity information to the RegS, and the RegS returns the authentication result of the UE identity information, and encrypts the transmission link to protect the security of the transmitted information. Report the above-mentioned encrypted personal identity information and the above-mentioned real-name authentication result to the above-mentioned website server.

[0026] The implementation steps and signaling interaction of the Internet real-name authentication mechanism are as follows:

[0027] 1. Registration stage

[0028] (1) The UE f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network safety, relates to the technologies of network identity authentication, identity mapping, network identity management and information protection, and aims to design a set of controllable real-name certification mechanism which is used for an internet and has high safety on the premise that the safety of user real identity is ensured. The mechanism is characterized in that a web server and a real-name register server which is used for judging whether the user identity is true or false are connected through a network, the real-name register server is used for recording user real-name information, the web server does not save true original personal identity information, and encrypted information processing is carried out in both a real-name register process and an identity tracing process. The mechanism disclosed by the invention has the advantages that abuse on the personal identity information is effectively and completely eradicated, controllability and searchability on an anonymous network behavior of an internet user can be realized, and valuable reference is provided for internet supervision.

Description

technical field [0001] The invention belongs to the technical field of network security and relates to network identity authentication, identity mapping, network identity management and information protection technologies. Background technique [0002] In the traditional Internet digital identity management system, each network application or website has its own independent user identity management system. When the same user accesses multiple systems and websites, it needs to register and manage multiple sets of login information, making the authentication system become increasingly complex and inefficient. Due to the openness and diversity of network applications, the implementation of the network real-name system must solve the problem of personal information security. In order to ensure that the real personal information of users is not leaked or stolen, an Internet identity supervision agency should be established to uniformly implement Internet real-name system informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 程琳马丁赵越李丹
Owner CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products